Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.222  Word version:  17.2.0

Top   Top   Up   Prev   None
0…   4…

 

4  Overview of the Security Architecturep. 8

5  Authentication schemesp. 9

6  Use of Authentication Proxyp. 18

A  Technical Solutions for Access to Application Servers via Authentication Proxy and HTTPSp. 23

B  Guidance on Certificate-based mutual authentication between UE and application serverp. 24

C  Considerations for GBA security using a web browser and Javascript |R12|p. 25

D (Normative)  Security measures for usage of GBA with a web browser |R12|p. 29

$  Change historyp. 36


Up   Top